The Science and Information (SAI) Organization
  • Home
  • About Us
  • Journals
  • Conferences
  • Contact Us

Publication Links

  • IJACSA
  • Author Guidelines
  • Publication Policies
  • Digital Archiving Policy
  • Promote your Publication
  • Metadata Harvesting (OAI2)

IJACSA

  • About the Journal
  • Call for Papers
  • Editorial Board
  • Author Guidelines
  • Submit your Paper
  • Current Issue
  • Archives
  • Indexing
  • Fees/ APC
  • Reviewers
  • Apply as a Reviewer

IJARAI

  • About the Journal
  • Archives
  • Indexing & Archiving

Special Issues

  • Home
  • Archives
  • Proposals
  • Guest Editors
  • SUSAI-EE 2025
  • ICONS-BA 2025
  • IoT-BLOCK 2025

Future of Information and Communication Conference (FICC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Computing Conference

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Intelligent Systems Conference (IntelliSys)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact

Future Technologies Conference (FTC)

  • Home
  • Call for Papers
  • Submit your Paper/Poster
  • Register
  • Venue
  • Contact
  • Home
  • Call for Papers
  • Editorial Board
  • Guidelines
  • Submit
  • Current Issue
  • Archives
  • Indexing
  • Fees
  • Reviewers
  • Subscribe

IJACSA Volume 3 Issue 10

Copyright Statement: This is an open access publication licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.

View Full Issue

Paper 1: Challenges of Future R&D in Mobile Communications

Abstract: This paper provides a survey for the main challenges of future research and development (R&D) for next generation mobile networks (NGNs). It addresses software and hardware re-configurability with focus on reconfigurable coupling and interworking amongst heterogeneous wireless access networks. It also explores the promising technologies for NGNs such as nanotechnology, cloud computing and texting by thinking. The paper then highlights the challenging research areas for enhancing network performance and affordability beginning with All IP network and security issues, Vehicular Ad Hoc Networks (VANET) and the necessity of high data rates at cell edges. Investigating the viability of cooperative networks and one unified global standard for NGNs, the paper analyzes macro-diversity and advanced multi-cell coordination for mitigating inter-cell interference. Direct device-to-device communication, global coverage using satellites and high-altitude platforms are presented as possible evolution paths for space roaming and extending NGN’ radio-access. Finally, the paper inspects the most developing applications for NGNs such as World-Wide Wireless Web (WWWW), machine-type communication, wireless sensor networks (WSNs), e-healthcare systems and wearable devices with AI capabilities.

Author 1: Dr. Anwar M. Mousa

Keywords: R&D; NGNs; re-configurability; VANET; nanotechnology; cloud computing; HAP; WWWW; WSNs; e-healthcare; wearable devices.

PDF

Paper 2: A Semantics for Concurrent Logic Programming Languages Based on Multiple-Valued Logic

Abstract: In order to obtain an understanding of parallel logic thought it is necessary to establish a fully abstract model of the denotational semantics of logic programming languages. In this paper, a fixed point semantics for the committed choice, non-deterministic family of parallel programming languages, i.e. the concurrent logic programming languages is developed. The approach is from an order theoretic viewpoint. We rigorously define a semantics for a Guarded Horn Clauses-type of language because of the minimal restrictions of the language. The extension to other concurrent logic programming languages would be direct and analogous, based on their specific rules of suspension. Today’s world is replete with multitasking and parallelism in general. The content of this paper reflects a paradigm of an application of multi-valued logic which is reflective of this.

Author 1: Marion Glazerman Ben-Jacob

Keywords: concurrent logic programming; multiple-valued logic; denotational semantics.

PDF

Paper 3: A Decision Tree Classification Model for University Admission System

Abstract: Data mining is the science and techniques used to analyze data to discover and extract previously unknown patterns. It is also considered a main part of the process of knowledge discovery in databases (KDD). In this paper, we introduce a supervised learning technique of building a decision tree for King Abdulaziz University (KAU) admission system. The main objective is to build an efficient classification model with high recall under moderate precision to improve the efficiency and effectiveness of the admission process. We used ID3 algorithm for decision tree construction and the final model is evaluated using the common evaluation methods. This model provides an analytical view of the university admission system.

Author 1: Abdul Fattah Mashat
Author 2: Mohammed M. Fouad
Author 3: Philip S. Yu
Author 4: Tarek F. Gharib

Keywords: Data Mining; Supervised Learning; Decision Tree; University Admission System; Model Evaluation.

PDF

Paper 4: A semantic cache for enhancing Web services communities activities: Health care case Study

Abstract: Collective memories are strong support for enhancing the activities of capitalization, management and dissemination inside a Web services community. To take advantages of collective memory, we propose an approach for indexing a health care Web services community’s’ resources with semantic annotations explaining and formalizing its informative content. Then we show how the health care Web services community’ members exploit their collective memory by expressing their queries allowing them searching relevant resources in order to perform their activities.

Author 1: Hela Limam
Author 2: Jalel Akaichi

Keywords: Web services community; semantic description; health care.

PDF

Paper 5: MDSA: Modified Distributed Storage Algorithm for Wireless Sensor Networks

Abstract: In this paper, we propose a Modified distributed storage algorithm for wireless sensor networks (MDSA). Wireless Sensor Networks, as it is well known, suffer of power limitation, small memory capacity,and limited processing capabilities. Therefore, every node may disappear temporarily or permanently from the network due to many different reasons such as battery failure or physical damage. Since every node collects significant data about its region, it is important to find a methodology to recover these data in case of failure of the source node. Distributed storage algorithms provide reliable access to data through the redundancy spread over individual unreliable nodes. The proposed algorithm uses flooding to spread data over the network and unicasting to provide controlled data redundancy through the network. We evaluate the performance of the proposed algorithm through implementation and simulation. We show the results and the performance evaluation of the proposed algorithm.

Author 1: Mohamed Labib Borham
Author 2: Mostafa-Sami Mostafa
Author 3: Hossam Eldeen Moustafa Shamardan

Keywords: Distrubited storage; encoding; decoding; flooding; multicasting; unicasting.

PDF

Paper 6: A Distributed Method to Localization for Mobile Sensor Networks based on the convex hull

Abstract: There has been recently a trend of exploiting the heterogeneity in WSNs and the mobility of either the sensor nodes or the sink nodes to facilitate data dissemination in WSNs. Recently, there has been much focus on mobile sensor networks, and we have even seen the development of small-profile sensing devices that are able to control their own movement. Although it has been shown that mobility alleviates several issues relating to sensor network coverage and connectivity, many challenges remain. Among these, the need for position estimation is perhaps the most important. Not only is localization required to understand sensor data in a spatial context, but also for navigation, a key feature of mobile sensors. This paper concerns the localization problem in the case where all nodes in the network (anchors and others sensors) are mobile. We propose the technique following the capabilities of nodes. Thus, each node obtains either an exact position or an approximate position with the knowledge of the maximal error born. Also, we adapt the periods where nodes invoke their localization. Simulation results show the performances of our method in term of accuracy and determinate the technique the more adapted related to the network configurations.

Author 1: Yassine SABRI,
Author 2: Najib EL KAMOUN

Keywords: wireless sensor network (WSN); Mobility; Localization; scalability.

PDF

Paper 7: A Strategy to Improve The Usage of ICT in The Kingdom of Saudi Arabia Primary School

Abstract: Integration of ICT in education is a complex idea that requires practical interpretation to get significant outcomes. As a developing country, the Kingdom of Saudi Arabia (the KSA) does not have a proper technological infrastructure as developed countries. Efficient strategies are vital in improving the application of ICT in the KSA’s primary schools effectively. Improving the usage of ICT in the KSA primary schools achievement entails integrating ICT into classroom. However, some barriers that prevent a successful ICT implementation in the primary school are still present. This paper proposes several strategies to trounce the challenges. Several recommendations for ICT integration in primary school applicable in the case of the KSA are also necessary. These strategies are executable at school and national scale.

Author 1: Gafar Almalki
Author 2: Neville Williams

Keywords: ICT; primary school; barrier; strategy.

PDF

Paper 8: Automatic Scheme for Fused Medical Image Segmentation with Nonsubsampled Contourlet Transform

Abstract: Medical image segmentation has become an essential technique in clinical and research- oriented applications. Because manual segmentation methods are tedious, and semi-automatic segmentation lacks the flexibility, fully-automatic methods have become the preferred type of medical image segmentation. This work proposes a robust fully automatic segmentation scheme based on the modified contouring technique. The entire scheme consists of three stages. In the first stage, the Nonsubsampled Contourlet Transform (NSCT) of image is computed. This is followed by the fusion of coefficients using fusion method. For that fused image local threshold is computed. This is followed by the second stage in which the initial points are determined by computation of global threshold. Finally, in the third stage, searching procedure is started from each initial point to obtain closed-loop contours. The whole process is fully automatic. This avoids the disadvantages of semi-automatic schemes such as manually selecting the initial contours and points.

Author 1: Ch.Hima Bindu
Author 2: Dr.K.Satya Prasad

Keywords: Non Sub sampled Contourlet Transform; Image Fusion; Automatic Segmentation.

PDF

Paper 9: Performance Analysis Of Multi Source Fused Medical Images Using Multiresolution Transforms

Abstract: Image fusion combines information from multiple images of the same scene to get a composite image that is more suitable for human visual perception or further image-processing tasks. In this paper the multi source medical images like MRI (Magnetic Resonance Imaging), CT (computed tomography) & PET (positron emission tomography) are fused using different multi scale transforms. We compare various multi resolution transform algorithms, especially the latest developed methods, such as; Non Subsampled Contourlet Transform, Fast Discrete Curvelet, Contourlet, Discrete Wavelet transform and Hybrid Method (combination of DWT & Contourlet) for image fusion. The fusion operations are performed with all Multi resolution transforms. The fusion rules like local maxima and spatial frequency techniques are used for selection in the low frequency and high frequency subband coefficients, which can preserve more information and quality in the fused image. The fused output obtained after the inverse transform of fused sub band coefficients. The experimental results show that the effectiveness of fusion approaches in fusing multi source images.

Author 1: Ch.Hima Bindu
Author 2: Dr.K.Satya Prasad

Keywords: Image Fusion; Discrete Wavelet Transform; Contourlet Transform; Fast Discrete Curvelet Transform; Nonsubsampled Contourlet Transform.

PDF

Paper 10: Defending Polymorphic Worms in Computer Network using Honeypot

Abstract: Polymorphic worms are a major threat to internet infrastructure security. In this mechanism we are using gate-translator, double honeypot, sticky honeypot, internal translator and antivirus of Cloud AV,which attracts polymorphic worms. We are proposing an algorithm to detect and remove polymorphic worms and innocuous traffic related packets.

Author 1: R. T. Goswamia

Keywords: Polymorphic worm; Honeypot; Honeynet; Sticky honeypot; Cloud computing.

PDF

Paper 11: Shape Prediction Linear Algorithm Using Fuzzy

Abstract: The goal of the proposed method is to develop shape prediction algorithm using fuzzy that is computationally fast and invariant. To predict the overlapping and joined shapes accurately, a method of shape prediction based on erosion and over segmentation is used to estimate values for dependent variables from previously unseen predictor values based on the variation in an underlying learning data set.

Author 1: Navjot Kaur
Author 2: Sheetal Kundra
Author 3: Harish Kundra

Keywords: Shape prediction; Shape recognition; Feature extraction.

PDF

Paper 12: The Development of Mobile Client Application in Yogyakarta Tourism and Culinary Information System Based on Social Media Integration

Abstract: Social network is currently being an important part of someone. Many of users in social network make it an effective publication. One of many things that can be published on social network is tourism. Indonesia has a lot of tourism and culinary, especially on Special District of Yogyakarta.Tourism and culinary resources on Yogyakarta can be published and shared using social network. In addition, development of mobile technology and smartphone make easier to access social network through internet. The release of Windows Phone 7 makes new color in the world of smartphone. Windows Phone 7comes with elegant interface, Metro Style. Besides that, standardized specification makes Windows Phone 7 suitable for integrating social network with tourism and culinary on Special District of Yogyakarta. This Research is expected to integrate social network with tourism and culinary on Yogyakarta. The method in this research is using ICONIX method. This method is one method that combines waterfall and agile methods. The results of this study are in the form of applications that run on Windows Phone 7 and consume a web service. This application provides information especially for tourist in order to be able to easily find culinary and tourism in Yogyakarta.

Author 1: Novrian Fajar Hidayat
Author 2: Ridi Ferdiana

Keywords: Social Network; Information Service; Culinary; Tourism; Windows Phone 7.

PDF

Paper 13: An Empirical Analysis Over the Four Different Feature-Based Face and Iris Biometric Recognition Techniques

Abstract: Recently, multimodal biometric systems have been widely accepted, which has shown increased accuracy and population coverage, while reducing vulnerability to spoofing. The main feature to multimodal biometrics is the amalgamation of different biometric modality data at the feature extraction, matching score, or decision levels. Recently, a lot of works are presented in the literature for multi-modal biometric recognition. In this paper, we have presented comparative analysis of four different feature extraction approaches, such as LBP, LGXP, EMD and PCA. The main steps involved in such four approaches are: 1) Feature extraction from face image, 2) Feature extraction from iris image and 3) Fusion of face and iris features. The performance of the feature extraction methods in multi-modal recognition is analyzed using FMR and FNMR to study the recognition behavior of these approaches. Then, an extensive analysis is carried out to find the effectiveness of different approaches using two different databases. The experimental results show the equal error rate of different feature extraction approaches in multi-modal biometric recognition. From the ROC curve plotted, the performance of the LBP and LGXP method is better compared to PCA-based technique.

Author 1: Deepak Sharma
Author 2: Dr. Ashok Kumar

Keywords: Multi-modal biometrics; Face Recognition; iris recognition; LBP operator (Local Binary Pattern); Local Gabor XOR Patterns; PCA and EMD.

PDF

Paper 14: An Approach to Keep Credentials Secured in Grid Computing Environment for the Safety of Vital Computing Resources

Abstract: Presently security attacks have aimed to vulnerabilities in repetitive-use authentication secrets like static passwords. The passwords are used by user in clients side are vulnerable, as the attackers can gain access to a user's password using different types of viruses as it is being typed. These attacks are directing many Grid sites to explore one-time password solutions for authentication in Grid deployment. We present here a novel mechanism called N-LSB where Grid security will be integrated with modified LSB based steganographic technique in order to meet the higher security demands for Grid credentials.

Author 1: Avijit Bhowmick
Author 2: C T Bhunia

Keywords: Grid; security; LSB; authentication.

PDF

Paper 15: A Novel Architecture for Network Coded Electronic Health Record Storage System

Abstract: The use of network coding for large scale content distribution improves download time. This is demonstrated in this work by the use of network coded Electronic Health Record Storage System (EHR-SS). A Novel Architecture of 4-layers to build the EHR-SS is designed. The application integrates the data captured for the patient from three modules namely administrative data, medical records of consultation and reports of medical tests. The lower layer is the data capturing layer using RFID reader. The data is captured in the lower level from different nodes. This data is combined with some linear coefficients using linear network coding. At the lower level the data from different tags are combined and stored and at the level 2 coding combines the data from multiple readers and a corresponding encoding vector is generated. This network coding is done at the server node through small mat lab net-cod interface software. While accessing the stored data, the user data has the data type represented in the form of decoding vector. For storing and retrieval the primary key is the patient id. The results obtained were observed with a reduction of download time of about 12% for our case study set up.

Author 1: B. Venkatalakshmi
Author 2: S. Shanmugavel

Keywords: Network coding; Electronic Health Record system; Distributed content storage; RFID; Linear network code.

PDF

Paper 16: A Secured Communication Based On Knowledge Engineering Technique

Abstract: Communication security has become the keynote of the "e" world. Industries like eComm, eGov were built on the technology of computer networks. Those industries cannot afford security breaches. This paper presents a methodology of securing computer communication based on identifying typical communication behavior of each system user based on the dominant set of protocols utilized between the network nodes.

Author 1: M. W. Youssef
Author 2: Hazem El-Gendy

Keywords: Computer Communications; Computer/ communications Protocols; Network Security; Authentication; Scrambling; Encryption; Standard Protocols; ISO Open System Interconnections (OSI) Model; object behavior analysis; knowledge engineering.

PDF

Paper 17: Enhanced Authentication Mechanisms for Desktop Platform and Smart Phones

Abstract: With hundreds of millions using computers and mobile devices all over the globe, these devices have an established position in modern society. Nevertheless, most of these devices use weak authentication techniques with passwords and PINs which can be easily hacked. Thus, stronger identification is needed to ensure data security and privacy. In this paper, we will explain the employment of biometrics to computer and mobile platforms. In addition, the possibility of using keystroke and mouse dynamics for computer authentication is being checked. Finally, we propose an authentication scheme for smart phones that shows positive results.

Author 1: Dina EL Menshawy
Author 2: Hoda M. O. Mokhtar
Author 3: Osman Hegazy

Keywords: Biometrics; Keystroke; Mouse; Authentication; Smart Phones; Touch Screens; Touch Pressure; Touch Contact Size.

PDF

Paper 18: Fusion of Biogeography based optimization and Artificial bee colony for identification of Natural Terrain Features

Abstract: Swarm Intelligence techniques expedite the configuration and collimation of the remarkable ability of group members to reason and learn in an environment of contingency and corrigendum from their peers by sharing information. This paper introduces a novel approach of fusion of two intelligent techniques generally to augment the performance of a single intelligent technique by means of information sharing. Biogeography-based optimization (BBO) is a recently developed heuristic algorithm, which proves to be a strong entrant in swarm intelligence with the encouraging and consistent performance. But, as BBO lacks inbuilt property of clustering, its behavior can be replaced with the honey bees of artificial bee colony (ABC), a new swarm intelligent technique. These two methods can be combined to create a new method which is easy to implement and gives more optimized results than the results when BBO is used. We have successfully applied this fusion of techniques for classifying diversified land cover areas in a multispectral remote sensing satellite image. The results illustrate that the proposed approach is very efficient than BBO and highly accurate land cover features can be extracted by using this approach.

Author 1: Priya Arora
Author 2: Harish Kundra
Author 3: Dr. V.K Panchal

Keywords: Biogeography-based Optimization; Artificial bee colony; Hybrid swarm intelligence; Image classification; Multi spectral dataset.

PDF

Paper 19: High Performance Speed Sensorless Control of Three-Phase Induction Motor Based on Cloud Computing

Abstract: Induction motor is a cast of alternating current motor where charge endures allotted to the rotor close-at-hand deputation of conductive charge. These motors are broadly applied in industrial claim due to they are arduous along with adhere no contacts. The speed controller of deltoid phase induction motor is applied to alleviate the aberration of speed. The central constructivist of this paper is to accrue the performance of speed sensorless control of three phase induction motor. To increase its performance, this paper presents a modified method for speed controller of an indirect vector-controlled induction motor drive using cloud computing technique. Our methodology depends on speed sensorless scheme to obtain the speed signal feedback; the speed estimator is based on model reference adaptive control that uses the stator current and rotor flux as state variables for estimating the speed. In this method, the stator current error is represented as a function of first degree of the estimated speed error. An analysis and simulation of the tried algorithm is birthed and applied easing a TMS320C31 floating-point notational alert Processor. And accumulate the action of the three phase induction motor we conceived our appraisals affixed to the accountant based on cloud computing tactics. This intelligent policy uses the guidelines of the speed controller efficiently. Simulation and experimental results depicted that the motor speed is decelerated articulately to destine its illusion apprise without above and inferior smack and with about zero steady state error. The apprised accelerate alert and its dispatching buoy amassed off line from burlesque. After effects display an advantageous affinity among the accounted speed alert and it's dispatching allocated as well as aped speed flares.

Author 1: Z. M. Salem
Author 2: M.A.Abbas

Keywords: cInduction motor; Cloud computing control; Sensorless control; Vector control; Observers; Modeling; Identification.

PDF

Paper 20: Prediction of Compressive Strength of Self compacting Concrete with Flyash and Rice Husk Ash using Adaptive Neuro-fuzzy Inference System

Abstract: Self-compacting concrete is an innovative concrete that does not require vibration for placing and compaction. It is able to flow under its own weight, completely filling formwork and achieving full compaction even in congested reinforcement without segregation and bleeding. In the present study self compacting concrete mixes were developed using blend of fly ash and rice husk ash. Fresh properties of theses mixes were tested by using standards recommended by EFNARC (European Federation for Specialist Construction Chemicals and Concrete system). Compressive strength at 28 days was obtained for these mixes. This paper presents development of Adaptive Neuro-fuzzy Inference System (ANFIS) model for predicting compressive strength of self compacting concrete using fly ash and rice husk ash. The input parameters used for model are cement, fly ash, rice husk ash and water content. Output parameter is compressive strength at 28 days. The results show that the implemented model is good at predicting compressive strength.

Author 1: S. S, Pathak
Author 2: Dr. Sanjay Sharma
Author 3: Dr. Hemant Sood
Author 4: Dr. R. K. Khitoliya

Keywords: Self compacting concrete; ANFIS; Flyash.

PDF

Paper 21: Smart Card Based Integrated Electronic Health Record System For Clinical Practice

Abstract: Smart cards are used in information technologies as portable integrated devices with data storage and data processing capabilities. As in other fields, smart card use in health systems became popular due to their increased capacity and performance. Smart cards are used as a Electronic Health Record (EHR) Their efficient use with easy and fast data access facilities leads to implementation particularly widespread in hospitals. In this paper, a smart card based Integrated Electronic health Record System is developed. The system uses smart card for personal identification and transfer of health data and provides data communication. In addition to personal information, general health information about the patient is also loaded to patient smart card. Health care providers use smart cards to access data on patient cards. Electronic health records have number of advantages over the paper record, which improve the accuracy, quality of patient care, reduce the cost, efficiency, productivity. In present work we measure the biomedical parameters like Blood Pressure, Diabetes Mellitus and Pulse oxygen measurement.,etc clinical parameters of patient and store health details in Electronic Health record. The system has been successfully tested and implemented (Abstract)

Author 1: N. Anju Latha
Author 2: B. Rama Murthy
Author 3: U. Sunitha

Keywords: Electronic health record; Smart card technology; Healthcare using smart cards.

PDF

Paper 22: NF-SAVO: Neuro-Fuzzy system for Arabic Video OCR

Abstract: In this paper we propose a robust approach for text extraction and recognition from video clips which is called Neuro-Fuzzy system for Arabic Video OCR. In Arabic video text recognition, a number of noise components provide the text relatively more complicated to separate from the background. Further, the characters can be moving or presented in a diversity of colors, sizes and fonts that are not uniform. Added to this, is the fact that the background is usually moving making text extraction a more intricate process. Video include two kinds of text, scene text and artificial text. Scene text is usually text that becomes part of the scene itself as it is recorded at the time of filming the scene. But artificial text is produced separately and away from the scene and is laid over it at a later stage or during the post processing time. The emergence of artificial text is consequently vigilantly directed. This type of text carries with it important information that helps in video referencing, indexing and retrieval.

Author 1: Mohamed Ben Halima
Author 2: Hichem karray
Author 3: Adel. M. Alimi
Author 4: Ana Fernández Vila

Keywords: Arabic Video OCR; Text Localization; Text Detection; Text extraction; Pattern Recognition; Neuro-Fuzy.

PDF

Paper 23: Secured Wireless Communication using Fuzzy Logic based High Speed Public-Key Cryptography (FLHSPKC)

Abstract: In this paper secured wireless communication using fuzzy logic based high speed public-key cryptography (FLHSPKC) has been proposed by satisfying the major issues likes computational safety, power management and restricted usage of memory in wireless communication. Wireless Sensor Network (WSN) has several major constraints likes’ inadequate source of energy, restricted computational potentiality and limited memory. Though conventional Elliptic Curve Cryptography (ECC) which is a sort of public-key cryptography used in wireless communication provides equivalent level of security like other existing public–key algorithm using smaller parameters than other but this traditional ECC does not take care of all these major limitations in WSN. In conventional ECC consider Elliptic curve point p, an arbitrary integer k and modulus m, ECC carry out scalar multiplication kP mod m, which takes about 80% of key computation time on WSN. In this paper proposed FLHSPKC scheme provides some novel strategy including novel soft computing based strategy to speed up scalar multiplication in conventional ECC and which in turn takes shorter computational time and also satisfies power consumption restraint, limited usage of memory without hampering the security level. Performance analysis of the different strategies under FLHSPKC scheme and comparison study with existing conventional ECC methods has been done.

Author 1: Arindam Sarkar
Author 2: J. K. Mandal

Keywords: Soft computing; Wireless Communication; High Speed; ECC.

PDF

Paper 24: A Hindi Speech Actuated Computer Interface for Web Search

Abstract: Aiming at increasing system simplicity and flexibility, an audio evoked based system was developed by integrating simplified headphone and user-friendly software design. This paper describes a Hindi Speech Actuated Computer Interface for Web search (HSACIWS), which accepts spoken queries in Hindi language and provides the search result on the screen. This system recognizes spoken queries by large vocabulary continuous speech recognition (LVCSR), retrieves relevant document by text retrieval, and provides the search result on the Web by the integration of the Web and the voice systems. The LVCSR in this system showed enough performance levels for speech with acoustic and language models derived from a query corpus with target contents.

Author 1: Kamlesh Sharma
Author 2: Dr. S.V.A.V. Prasad
Author 3: Dr. T. V. Prasad

Keywords: Web search; Hindi speech; HSACIWS; computer interface; human computer interaction.

PDF

Paper 25: A Harmony Search Based Algorithm for Detecting Distributed Predicates

Abstract: Detection of distributed predicates (also referred to as runtime verification) can be used to verify that a particular run of a given distributed program satisfies certain properties (represented as predicates). Consequently, distributed predicates detection techniques can be used to effectively improve the dependability of a given distributed application. Due to concurrency, the detection of distributed predicates can incur significant overhead. Most of the effective techniques developed to solve this problem work efficiently for certain classes of predicates, like conjunctive predicates. In this paper, we have presented a technique based on harmony search to efficiently detect the satisfaction of a predicate under the possibly modality. We have implemented the proposed technique and we have conducted several experiments to demonstrate its effectiveness.

Author 1: Eslam Al Maghayreh

Keywords: Distributed Systems; Detection of Distributed Predicates; Runtime Verification; Harmony Search; Testing; Debugging.

PDF

Paper 26: A Novel Technique for Glitch and Leakage Power Reduction in CMOS VLSI Circuits

Abstract: Leakage power has become a serious concern in nanometer CMOS technologies. Dynamic and leakage power both are the main contributors to the total power consumption. In the past, the dynamic power has dominated the total power dissipation of CMOS devices. However, with the continuous trend of technology scaling, leakage power is becoming a main contributor to power consumption. In this paper, a technique has been proposed which will reduce simultaneously both glitch and leakage power. The results are simulated in Microwind3.1 in 90nm and 250 nm technology at room temperature.

Author 1: Pushpa Saini
Author 2: Rajesh Mehra

Keywords: Dynamic power; Leakage power; Multi-threshold; Variable body biasing; Glitch.

PDF

Paper 27: An Algorithm for Solving Natural Language Query Execution Problems on Relational Databases

Abstract: There continues to be an increased need for non-experts interaction with databases. This is essential in their quest to make appropriate business decisions. Researchers have, over the years, continued to find a methodology that bridges the gap that exist between information need and users satisfaction. This has been the core in studies related to natural language information retrieval. In this paper, we understudy the existing methodology and develop a model to extend the proposition of (a) Bhardwaj et al where a MAPPER was developed and implemented on student database and (b) Nihalani et al. where an integrated interface was used on relational databases. We present a time saving executable algorithm that satisfies needed conditions required to retrieve results of natural language based queries from relational databases. Results of the experiment shows that the performance index of the algorithm is satisfactory and can be improved upon increasing the metadata table of the relational database. This is a sharp diversion from the keyword based search that has dominated most commercial databases in use today. The implementation was deployed in PHP and the retrieval time has compared favorably with earlier deployed models. We further propose the extension of this work in the areas of inculcating some fuzzy constraints to handle uncertainty and ambiguity which are inherent in human natural language.

Author 1: Enikuomehin A. O
Author 2: Okwufulueze D.O

Keywords: Relational Database; Interface; Natural Language; Query; SQL.

PDF

Paper 28: Quantifiable Analysis of Energy Efficient Clustering Heuristic

Abstract: One of the important aspects of MANET is the restraint of quantity of available energy in the network nodes that is the most critical factor in the operation of these networks. The tremendous amount of energy using the mobile nodes in wireless communication medium makes Energy Efficiency a fundamental requirement for mobile ad hoc networks. The cluster-based routing protocols are investigated in several research studies which encourage more well-organized usage of resources in controlling large dynamic networks. Clustering can be done for different purposes, such as, routing efficiency, transmission management, backbone management etc. Less flooding, distributed operation, locally repairing of broken routes and shorter sub-optimal routes are the main features of the Clustering protocol. In this paper, we present quantifiable analysis of energy efficient cluster-based routing protocol for uninterrupted stream queries.

Author 1: Anita Sethi
Author 2: J. P. Saini
Author 3: Manoj Bisht

Keywords: Cluster; ClusterHead; Gateway; Associated nodes; Energy Efficiency.

PDF

Paper 29: A Newer User Authentication, File encryption and Distributed Server Based Cloud Computing security architecture

Abstract: The cloud computing platform gives people the opportunity for sharing resources, services and information among the people of the whole world. In private cloud system, information is shared among the persons who are in that cloud. For this, security or personal information hiding process hampers. In this paper we have proposed new security architecture for cloud computing platform. This ensures secure communication system and hiding information from others. AES based file encryption system and asynchronous key system for exchanging information or data is included in this model. This structure can be easily applied with main cloud computing features, e.g. PaaS, SaaS and IaaS. This model also includes onetime password system for user authentication process. Our work mainly deals with the security system of the whole cloud computing platform.

Author 1: Kawser Wazed Nafi
Author 2: Tonny Shekha Kar
Author 3: Sayed Anisul Hoque
Author 4: Dr. M. M. A Hashem

Keywords: Cloud Computing; Security architecture; AES; RSA; onetime password; MD5 Hashing; Hardwire database encryption.

PDF

Paper 30: FPGA Implementation of 5/3 Integer DWT for Image Compression

Abstract: The wavelet transform has emerged as a cutting edge technology, in the field of image compression. Wavelet-based coding provides substantial improvements in picture quality at higher compression ratios. In this paper an approach is proposed for the compression of an image using 5/3(lossless) Integer discrete wavelet transform (DWT) for Image Compression. The proposed architecture, based on new and fast lifting scheme approach for (5, 3) filter in DWT. Here an attempt is made to establish a Standard for a data compression algorithm applied to two-dimensional digital spatial image data from payload instruments.

Author 1: M Puttaraju
Author 2: Dr.A.R.Aswatha

Keywords: 2D-DWT; Lifting; CCDS; wavelet transform; 1DDWT.

PDF

Paper 31: Request Analysis and Dynamic Queuing System for VANETs

Abstract: Vehicular Ad hoc Network (VANET) is a kind of mobile ad hoc network using the capabilities of wireless communication for Vehicle-to-Vehicle and Vehicle-to-Roadside communication to provide safety and comfort to vehicles in transportation system. People in vehicles want to access data of their interest from Road Side Unit (RSU). RSU need to schedule these requests in a way to maximize the service ratio. In this paper we have proposed new methods for careful analysis of incoming requests to find whether these requests can be completed within deadline or not and to provide dynamic service queue. Simulation results show that the proposed schemes increase the service ratio significantly.

Author 1: Ajay Guleria
Author 2: Narottam Chand
Author 3: Mohinder Kumar
Author 4: Lalit Awasthi

Keywords: Road Side Uni; Service Ratio; Propagation Delay; Service Queue.

PDF

The Science and Information (SAI) Organization
BACK TO TOP

Computer Science Journal

  • About the Journal
  • Call for Papers
  • Submit Paper
  • Indexing

Our Conferences

  • Computing Conference
  • Intelligent Systems Conference
  • Future Technologies Conference
  • Communication Conference

Help & Support

  • Contact Us
  • About Us
  • Terms and Conditions
  • Privacy Policy

© The Science and Information (SAI) Organization Limited. All rights reserved. Registered in England and Wales. Company Number 8933205. thesai.org